• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
tips & tricks for unmasking ghoulish api behavior

Tips & Tricks for Unmasking Ghoulish API Behavior

You are here: Home / Latest Cyber Security Vulnerabilities / Tips & Tricks for Unmasking Ghoulish API Behavior
September 30, 2021

Jason Kent, hacker-in-home at Cequence Security, discusses how to track consumer-agent connections to mobile and desktop APIs, to location destructive action.

I was examining 1 of my customer’s API website traffic the other working day and I found one thing odd about the units that have been working with the mobile application API. I found standard browsers like Firefox and Chrome hitting API endpoints that ought to only be touched by their cellular-software interaction.

In the application growth planet, we phone browsers “user brokers (UA)” or “user-agent strings.” For instance, when an analyst seems to be at a batch of web logs, they would see the person agent for Chrome appearing as “Mozilla/5. (Macintosh Intel Mac OS X 11_5_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92..4515.159 Safari/537.36.” This is a user sitting down in front of a notebook or desktop with Chrome open, browsing the web.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


On a cell application, the enhancement staff will produce a person agent for their software. It can be anything like “CoolAppV1-iPhone,” or anything else they want to use. The iPhone and Android user brokers are normally various, but they are just about constantly a hand-coded string that indicates a little something to the developers.

In this way you can monitor what sort of equipment are hitting the APIs. Which is helpful, simply because I advocate that the API endpoints that the cellular applications and the web apps be fully diverse.

Different Mobile and Web Domains

That is for the reason that applying generic terms that only your crew is aware in get to individual cellular and web domains tends to make it easier for you to place destructive conduct.

For instance, iPhone or Android apps might talk with application.example.com, although the web site is www.case in point.com. This separation of subdomains and application circulation permits us to see in which the UA outliers may well be.

For occasion, if I see Chrome browser activity on a laptop displaying up on application.instance.com, I know a thing is up. It could be a developer testing their work, but this is unlikely in output. It could be a fluke, but flukes are rare in security. Most probably, an individual has taken the application conversation apart and is poking close to.

Similarly, if you have a web application that is ordinarily made use of via a web browser, analyzing the types of browsers that land on your webpage is significant. Threat actors will normally check out to disguise in plain sight by manipulating, or rotating by means of a superior amount of UAs. Recently we are seeing browsers that search like “Ruby” or “HTTP” but they are not real user-agent strings.

Beware of Crawlers

UAs are also widespread targets for acknowledged “crawlers” like Facebook (facebookexternalhit/1.1 (+http://www.fb.com/externalhit_uatext.php)), which crawl various spots on a internet site but ought to not often be found in your mobile app circulation.

The only conversation that should really be touching your cell software are the mobile programs set up on your user’s telephones. If you are observing crawlers on your cell software, you may have a dilemma in other places. It could be that by some means the endpoints are getting acquired by the Facebook crawler as it indiscriminately finds and tests URIs.

If you see suspicious exercise on your UAs, you should really glance for doable glitches like reviews with URIs in them, marketed routes, or code repos publicly exposed or inside your application paths. A public crawler on your application cloth is usually a precursor to visitors from danger actors.

Look at for Suspicious Patterns in Your Application Logs

As a straightforward initially phase, review the UAs most common in your software logs. If you are viewing odd or really aged user-agent strings, you may have a risk actor poking all over. Periodic log opinions are critical in discovering most likely malicious styles. Acquiring a systematic way to critique these merchandise and elevate alarms, if necessary, can correctly minimize the malicious traffic on your web and cell applications.

Base line: Security frequently boils down to investigation of every day items in purchase to detect patterns and put mitigations in put that preserve the environment risk-free.

Jason Kent is hacker-in-home at Cequence Security.

Get pleasure from added insights from Threatpost’s Infosec Insiders group by visiting our microsite.


Some components of this report are sourced from:
threatpost.com

Previous Post: «Cyber Security News Cyber-bullied Footballer Donates Compensation to Charity
Next Post: Scammers Capitalize on Release of New Bond Movie Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.